BT
Older Newer rss
40:50

Securing Code Through Social Engineering

Posted by Christina Camilleri  on  Dec 23, 2015

Christina Camilleri shows how social engineering can change the way security is woven into testing, operations, and development workflows to better secure code against human threats.

35:23

Android Apps, an Attacker’s Perspective

Posted by Tony Trummer  on  Dec 23, 2015

Tony Trummer focuses on how to apply an adversarial perspective when building Android applications, how to identify attack surfaces and the thought process attackers use.

01:24:46

The State of Securing RESTful APIs with Spring

Posted by Rob Winch  on  Dec 20, 2015 1

Rob Winch discusses how to properly secure your RESTful endpoints and explores some common pitfalls when applying security to RESTful APIs with the help of Spring Security.

50:00

Applications Through an Attacker’s Lens

Posted by Michael Coates  on  Dec 18, 2015

Michael Coates explores how attackers target, analyze and compromise applications and discusses recent high profile compromises and deconstructs them to understand exactly what went wrong.

49:45

Improving Cloud Security with Attacker Profiling

Posted by Bryan Payne  on  Dec 18, 2015

Bryan Payne provides a clear understanding of different types of attackers, their skill sets, and how compromises happen, with a specific focus on protecting cloud-based applications.

45:11

Is your profiler speaking the same language as you?

Posted by Simon Maple  on  Dec 10, 2015

This talk covers the classic profiler features. What is a hotspot? What is the difference between sampling and instrumentation from the profiler perspective? What are the problems with those methods?

48:17

The Imitation Game: The New Frontline of Security

Posted by Shuman Ghosemajumder  on  Dec 04, 2015

S. Ghosemajumder reviews the evolution of AI based security attacks that imitate the actions of real people, and looks at how they are changing the nature of developing online applications securely.

01:32:29

A How-to Guide to Security in the PAAS Cloud

Posted by John Field,Shawn McKinney  on  Nov 28, 2015

John Field and Shawn McKinney examine the security of a typical Java web application and describe 5 common application security architecture patterns taken from real world customer problems.

01:29:39

Securing Microservices with Spring Cloud Security

Posted by Will Tran  on  Nov 28, 2015

Will Tran talks about the authentication and authorization scenarios that one may encounter once he starts building out microservices.

51:11

Weaving Security into the SDLC

Posted by Bill Sempf  on  Oct 28, 2015

Bill Sempf discusses security in the context of the SDLC, presenting the analysis results from reviewing several code sources, the problems found and the corresponding solutions.

35:22

Here Be Dragons: Security Maps of the Container New World

Posted by Josh Bregman  on  Oct 11, 2015

Josh Bregman explores some of the security challenges created by both the development workflow and application runtime, why SecDevOps 1.0 is insufficient, and how SecDevOps 2.0 can help.

52:52

Privacy is Always a Requirement

Posted by Eleanor McHugh  on  Oct 07, 2015

Eleanor McHugh shares insights on digital privacy, encouraging others to gather the minimum information possible about their users in order to serve their needs.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT